Create a learned baseline of OT alerts
This article is one in a series of articles describing the deployment path for OT monitoring with Microsoft Defender for IoT, and describes how to create a baseline of learned traffic on your OT sensor.
Overview of the multi stage monitoring process
An OT network sensor starts monitoring your network automatically after it connects to the network and you sign in. Network devices start appearing in your device inventory, and alerts are triggered for any security or operational incidents that occur in your network.
Defender for IoT employs a three stage monitoring process that learns your network's normal traffic behavior. These three stages ensure accurate detection while reducing unnecessary alerts, are:
Summary of the monitoring stages
Mode | Purpose | Trigger alerts | User actions needed |
---|---|---|---|
Learning | Builds a baseline of normal network traffic | Malware alerts, anomaly alerts, operational alerts, protocol violation alerts | Turn off manually after 2–6 weeks or when baseline reflects accurate network activity |
Dynamic | Refines the baseline while gradually introducing Policy Violations alerts to ensure accuracy and reduce alert noise | Policy Violation alerts are introduced | Optional: Adjust settings for specific scenarios (e.g. during POCs) |
Operational | Monitors all network traffic with a stable baseline, triggering all alerts to reflect deviations or suspicious activity | All types of alerts | None. Automatically transitions when baseline stabilizes |
Learning mode
Initially, the sensor runs in learning mode to monitor all of your network traffic and build a baseline of all normal traffic patterns. This baseline includes all of the devices and protocols in your network, and the regular file transfers that occur between devices. This process normally takes between 2 and 6 weeks, depending on your network size and complexity. Additionally, any devices discovered later enter learning mode for 7 days in order to establish their network traffic baseline.
In learning mode, the sensor monitors and protects your environment by triggering relevant security alerts, such as malware, anomaly and operational alerts. However, Policy Violation alerts, which indicate deviations from the baseline, aren't triggered while the system is in learning mode.
Dynamic mode
Once the discovery process and network traffic are stable, you should manually turn off learning mode. At this point, the sensor transitions to dynamic mode. In dynamic mode the sensor continues to monitor your network, validating and refining the baseline. The sensor assesses each alert category and scenario individually, dynamically changing them to operational mode when their baselines are confirmed to be accurate. Alternatively, if the sensor detects significant changes in traffic, it might automatically extend the learning mode for specific alerts or scenarios.
In dynamic mode, Policy Violation alerts are gradually introduced and start to appear in the alert inventory.
Operational mode
Once the sensor identifies that the baseline is stable and complete it automatically transitions into operational mode, monitoring all of the network traffic and triggering all alert types.
The Learn action becomes relevant after learning mode is turned off, when the scenario transitions to operational mode, and you wish to mark specific operations as authorized or expected activity. Once learned, similar activity won't generate new alerts in the future.
Turn off learning mode manually when the level of alerts accurately reflect your network activity.
For more information, see Microsoft Defender for IoT alerts.
Prerequisites
You can perform the procedures in this article from the Azure portal or an OT sensor.
Before you start, make sure that you have:
An OT sensor installed, configured, and activated, with alerts triggered by detected traffic.
Access to your OT sensor as Security Analyst or Admin user. For more information, see On-premises users and roles for OT monitoring with Defender for IoT.
Triage alerts
Triage alerts towards the end of your deployment to create an initial baseline for your network activity.
Sign into your OT sensor and select the Alerts page.
Use sorting and grouping options to view your most critical alerts first. Review each alert to update statuses and learn alerts for OT authorized traffic.
For more information, see View and manage alerts on your OT sensor.
Next steps
After learning mode is turned off, and you move from learning mode to operation mode continue with any of the following:
- Visualize Microsoft Defender for IoT data with Azure Monitor workbooks
- View and manage alerts from the Azure portal
- Manage your device inventory from the Azure portal
Integrate Defender for IoT data with Microsoft Sentinel to unify your SOC team's security monitoring. For more information, see: